Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-18 15:12

>>69
It might not be displayed on a monitor, because someone might make a photograph.

Which is clearly intentional, and thus fodder for the legal department. However, TC prevents people from accidentally sending the document where it shouldn't go; it provides quite a large roadblock.

>>71
Owning the keys ≠ controlling the implementation. Who knows what you get for free with your TC deal?

The same can be said for the BIOS and the rest of the hardware. Truth is, none of us really knows what goes on in that layer. We just trust it's not doing something we don't. So what's your point?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List